MITRE ATT&CK-driven cyber risk assessment
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …
understanding the methods and tactics adversaries use to attack an organisation. The …
Dynamic probabilistic risk assessment for electric grid cybersecurity
Electric grid cybersecurity risk has become a significant concern of industries and
governments. This paper proposes a dynamic probabilistic risk assessment method for …
governments. This paper proposes a dynamic probabilistic risk assessment method for …
[HTML][HTML] “Talking a different Language”: Anticipating adversary attack cost for cyber risk assessment
Typical cyber security risk assessment methods focus on the system under consideration, its
vulnerabilities, and the resulting impact in the event of a system compromise. Cyber security …
vulnerabilities, and the resulting impact in the event of a system compromise. Cyber security …
Automated generation of attack graphs using NVD
Today's computer networks are prone to sophisticated multi-step, multi-host attacks.
Common approaches of identifying vulnerabilities and analyzing the security of such …
Common approaches of identifying vulnerabilities and analyzing the security of such …
Predicting CVSS metric via description interpretation
Cybercrime affects companies worldwide, costing millions of dollars annually. The constant
increase of threats and vulnerabilities raises the need to handle vulnerabilities in a …
increase of threats and vulnerabilities raises the need to handle vulnerabilities in a …
GRAVITAS: Graphical reticulated attack vectors for Internet-of-Things aggregate security
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of
devices connected in a complex network topology. The diversity and complexity of these …
devices connected in a complex network topology. The diversity and complexity of these …
Vercasm-cps: Vulnerability analysis and cyber risk assessment for cyber-physical systems
Since Cyber-Physical Systems (CPS) are widely used in critical infrastructures, it is essential
to protect their assets from cyber attacks to increase the level of security, safety and …
to protect their assets from cyber attacks to increase the level of security, safety and …
Information security risk assessment using situational awareness frameworks and application tools
This paper describes the development of situational awareness models and applications to
assess cybersecurity risks based on Annex ISO 27001: 2013. The risk assessment method …
assess cybersecurity risks based on Annex ISO 27001: 2013. The risk assessment method …
A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making
The challenge of decision‐making under uncertainty in information security has become
increasingly important, given the unpredictable probabilities and effects of events in the ever …
increasingly important, given the unpredictable probabilities and effects of events in the ever …
A Methodological Framework for AI-Assisted Security Assessments of Active Directory Environments
The pervasiveness of complex technological infrastructures and services coupled with the
continuously evolving threat landscape poses new sophisticated security risks. These risks …
continuously evolving threat landscape poses new sophisticated security risks. These risks …